2008 IEEE Conference on Technologies for Homeland Security最新文献

筛选
英文 中文
Exploiting Random Patterns of Optically Readable Materials to Ensure Authentication of Documents, Media & Substrates 利用光学可读材料的随机模式来确保文件、媒体和基材的认证
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534492
J. Fraser
{"title":"Exploiting Random Patterns of Optically Readable Materials to Ensure Authentication of Documents, Media & Substrates","authors":"J. Fraser","doi":"10.1109/THS.2008.4534492","DOIUrl":"https://doi.org/10.1109/THS.2008.4534492","url":null,"abstract":"Despite attempts of existing technologies, the problem of counterfeit products and documents persists. Advanced capabilities of counterfeiters have thwarted earlier attempts to solve the problem. Also, many existing solutions have either shown security flaws or require an infrastructure build-out. Tracer Detection Technology Corp. offers a theoretically foolproof confirmation of the authenticity of a document or article, even if the 'past-gen\" technologies have been compromised or are included in a tiered system. Exploiting random patterns of optically materials that are image processed and matched to a machine-readable code, Tracer's solution creates a non-duplicable digital fingerprint, enabling verification of the authenticity of the protected articles. Using wired or wireless readers, an article is authentic only if the code confirms the pattern and its optical characteristics. This system is in the final stages of development. A prototype system exists as the basis for the completion of a reproducible commercial reader expected to be market ready before end of 2008.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"358 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116551290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unified Incident Command and Decision Support (UICDS): A Department of Homeland Security Initiative in Information Sharing 统一事件指挥和决策支持(UICDS):国土安全部在信息共享方面的倡议
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534471
J. Morentz
{"title":"Unified Incident Command and Decision Support (UICDS): A Department of Homeland Security Initiative in Information Sharing","authors":"J. Morentz","doi":"10.1109/THS.2008.4534471","DOIUrl":"https://doi.org/10.1109/THS.2008.4534471","url":null,"abstract":"Unified incident command and decision support is an initiative to architect, develop, and deploy a \"middleware\" foundation that enables ubiquitous information exchange among existing government and commercial incident management technologies for the purpose of creating role-based, incident-specific situational awareness and information sharing. This paper describes the architecture and pilot development that will lead to UICDS providing decision support on end-user digital devices that include standard computers, PDAs, and radios to individuals, teams, and organizations that engage in risk prevention, protection, response, and recovery. A case study of decision support enabled by UICDS describes how geospatial predictive analytics utilizes UICDS information sources to anticipate potential natural, technological, and terrorist events and effectively allocate resources to counter them.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131270367","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
A Review of Human Signatures in Urban Environments Using Seismic and Acoustic Methods 基于地震和声学方法的城市环境人类特征研究综述
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534452
J. Sabatier, A. Ekimov
{"title":"A Review of Human Signatures in Urban Environments Using Seismic and Acoustic Methods","authors":"J. Sabatier, A. Ekimov","doi":"10.1109/THS.2008.4534452","DOIUrl":"https://doi.org/10.1109/THS.2008.4534452","url":null,"abstract":"Techniques for sensing footstep vibrational frequencies, typically below 100 Hz, by seismic sensors are well- developed human detection methods. Walking styles (standard, soft, or stealthy) and the background noise floor limit the detection range of footsteps. Walking style changes the dynamic footstep force on the ground and the influences the footstep detection range. The seismic background noise floor is much higher in urban areas and in buildings than in rural areas, dramatically influencing detection range. Alternatively, high- frequency passive and active ultrasonic methods for human detection are being developed. High-frequency sound produced by friction forces between a foot and the ground/floor allow passive footstep detection in urban areas and in buildings. The active method utilizes continuous-wave Doppler ultrasound. Simultaneously collecting Doppler motion and footstep ultrasonic signals reveals correlated timing features between the footstep friction and the Doppler shift from the human motion. Discrimination between human and other moving targets is accomplished by analyzing the envelopes of footstep signatures.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131275113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Real-Time Text and Language Independent Speaker Identification with a Reconfigurable Wireless Network of Acoustic Sensors 基于可重构无线声传感器网络的实时文本和语言无关说话人识别
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534491
M. Bocca, H. Koivo
{"title":"Real-Time Text and Language Independent Speaker Identification with a Reconfigurable Wireless Network of Acoustic Sensors","authors":"M. Bocca, H. Koivo","doi":"10.1109/THS.2008.4534491","DOIUrl":"https://doi.org/10.1109/THS.2008.4534491","url":null,"abstract":"This paper describes a reconfigurable wireless network of acoustic sensors that records voice signals in different areas of a building and conveys them at the sink node. At their arrival, a light-weight text and language independent algorithm performs the speaker identification task in real time. The end-user can interrupt the normal operation mode of the network and require a signal to a particular node, specifying also sampling frequency and time length of the sampling period. In our simulations, we use a database composed of 200 signals, 60 individuals, and 15 languages. The total execution time is less than 2 seconds. We optimize the parameters of the algorithm, achieving 83% accuracy. We also evaluate its robustness when the sampling frequency and the time length of the signals are reduced. Finally, the power consumption of the operating nodes is analyzed.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131621867","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Second Life: Limits Of Creativity Or Cyber Threat? 第二人生:创造力的极限还是网络威胁?
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534503
S. Mandal, Ee-Peng Lim
{"title":"Second Life: Limits Of Creativity Or Cyber Threat?","authors":"S. Mandal, Ee-Peng Lim","doi":"10.1109/THS.2008.4534503","DOIUrl":"https://doi.org/10.1109/THS.2008.4534503","url":null,"abstract":"The paper explores the possibility of the spread of extremism and the potential threat of cyber terrorism in the fast growing virtual world of Second Life (SL). After introducing SL, the paper looks at the 'griefing' attacks in Second Life, which may be akin to terrorism in real life. It also analyses the potential use of SL for indoctrination, recruiting, rehearsing attacks, organisation and communication by extremist groups. The paper states that social interaction that mirror real life interactions in Second Life can provide opportunities for the sharing of socio-political ideas and even an avenue for organising political activities. There also exists the potential use of SL by extremist groups for enhanced and easier communication. Rehearsing attacks is improbable while some initial planning and reconnaissance for potential terrorist attacks can be carried out. However, the threat of money laundering in SL is credible. Today, the spread of extremism on the Internet and their potential foray into the virtual world is a credible threat that all stakeholders in the international community need to be aware of.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133267966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
The Use of ID Reader-Authenticators in Secure Access Control and Credentialing ID阅读器-身份验证器在安全访问控制和认证中的应用
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534458
T. Kuklinski, B. Monk
{"title":"The Use of ID Reader-Authenticators in Secure Access Control and Credentialing","authors":"T. Kuklinski, B. Monk","doi":"10.1109/THS.2008.4534458","DOIUrl":"https://doi.org/10.1109/THS.2008.4534458","url":null,"abstract":"Knowing who is entering, and whether they should be granted access, is key information for many types of military, government and commercial facilities. In many situations, access is granted based on an Identification Document (ID) such as a driver's license, passport, visa, or other specialized ID card. Although screeners are trained to detect false IDs, they have the daunting task of trying to do this within a few seconds for large numbers of people and types of documents on a daily basis. Newer cost effective ID Reader-Authenticators can add a high degree of automation and accuracy to the secure access control process. Available in a variety of physical configurations, they can automatically read IDs in full color at high resolution with multiple light sources, extracting image fields such as photos, as well as data fields, whether from text, barcodes, magnetic stripes, or embedded chips. The data extracted can be vetted against external watchlists without compromising privacy. They can process most currently issued IDs whether or not they contain machine readable enhancements. IDs can be authenticated via a wide variety of tests based on detecting embedded security features. Reader-Authenticators are particularly useful in the enrollment process (as part of new government ID initiatives) to avoid issuing IDs based on false breeder documents. Secure access control, whether at a national border, secure installation, lobby of a building, or airport screening area, can be enhanced with the use of today's advanced Reader-Authenticator technology.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"200 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133939429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
CBRN Decontamination using a Large-Area Cold Plasma Applicator 使用大面积冷等离子体涂抹器进行CBRN去污
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534509
G. Konesky
{"title":"CBRN Decontamination using a Large-Area Cold Plasma Applicator","authors":"G. Konesky","doi":"10.1109/THS.2008.4534509","DOIUrl":"https://doi.org/10.1109/THS.2008.4534509","url":null,"abstract":"The medical community has used cold plasma for several years. A cold plasma is an ionized gas in which only a small fraction of the gas molecules are ionized, and is formed by passing an inert gas, such as argon or helium, over a sharp conductive point that is held at high voltage and high frequency. An additional benefit in the medical application of this technology is enhanced wound healing due to the destruction of infectious microbial agents without damaging healthy tissue. By expanding the cold plasma applicator to an area of a square meter or more, a general purpose decontamination device results with uses in the destruction of biological and chemical agents, and in assisting in the removal of radiological agents, while causing minimal or no damage to the contaminated substrate material. This approach is especially useful on porous surfaces. The use of large-area low cost applicators, utilizing numerous simultaneous independent plasma emitters for CBRN decontamination applications is considered.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122410210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Gamma Vector Camera: A Gamma Ray and Neutron Directional Detector 伽马矢量相机:一种伽马射线和中子定向探测器
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534502
M. Hindi, L. Klynn, H. Demroff
{"title":"Gamma Vector Camera: A Gamma Ray and Neutron Directional Detector","authors":"M. Hindi, L. Klynn, H. Demroff","doi":"10.1109/THS.2008.4534502","DOIUrl":"https://doi.org/10.1109/THS.2008.4534502","url":null,"abstract":"We have built a proof-of-concept gamma-ray camera capable of imaging the Compton recoil electron tracks in 3D, and reconstructing the gamma-ray source direction and energy spectrum from those tracks. The electrons are tracked in a fiber-optic scintillating block made from polystyrene fibers arranged in alternating, orthogonal layers, and viewed by image intensifiers and CCD cameras. We have also demonstrated the detection of neutrons in the same gamma camera by recording the scintillation light from proton recoils in the fibers, and discriminating between protons and electrons based on their different ranges in polystyrene. We have developed software that reconstructs the energy and direction of the recoil electrons and reconstructs the energy spectrum and direction of the gamma rays from (1) single Compton scattering, by computing the mean electron direction of a statistical sample, and (2) double and triple Compton scattering by full kinematic reconstruction of the energy and direction of individual gamma rays.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127701401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Device Independent Information Sharing During Incident Response 事件响应期间的设备独立信息共享
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534501
D. Goughnour, R. Durbin
{"title":"Device Independent Information Sharing During Incident Response","authors":"D. Goughnour, R. Durbin","doi":"10.1109/THS.2008.4534501","DOIUrl":"https://doi.org/10.1109/THS.2008.4534501","url":null,"abstract":"Information sharing during incident response is a critical component to success. Responders should be able to quickly connect to an information network to access information that is situation relevant using a variety of devices and software. In such an environment cell phones, PDAs, and wireless laptops should be able to connect and share information including locations and status of human and material resources as well as casualties. The following scenarios present the need to collect and process data from varied devices to provide alerts and visual reference when events of concern occur during incident response. 1. Incident response begins with the setup of mobile servers that begin data assimilation and sharing. Responders know through prearranged protocols how to connect with any communications device to announce their activities and locations. Assets such as water, food, medicine, and other supplies are tracked. Alerts are provided when assets deviate from planned routes and locations or are suspected missing. 2. Portable Web cams are deployed to monitor critical points with selected access to media. VIPs and press representatives are provided active GPS devices and are constantly tracked. Alerts are provided to responders if visitors enter areas where they might face danger or interfere with operations. 3. Relevant situational alerts are provided to responders when their proximity to the incident put them at risk. Whether encircling fire, rising water, or washed out roads and bridges spatially aware monitoring detects and alerts situations where rescuers and responders are at risk of being trapped in danger before it happens.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127871464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Identifying Technology Gaps in Hazardous Materials Operations 识别危险材料操作中的技术差距
2008 IEEE Conference on Technologies for Homeland Security Pub Date : 2008-05-12 DOI: 10.1109/THS.2008.4534455
J. Drury, J. Arambula, S. Kuhn, M. Micire, H. Yanco
{"title":"Identifying Technology Gaps in Hazardous Materials Operations","authors":"J. Drury, J. Arambula, S. Kuhn, M. Micire, H. Yanco","doi":"10.1109/THS.2008.4534455","DOIUrl":"https://doi.org/10.1109/THS.2008.4534455","url":null,"abstract":"Our eventual goal is to design new decision support technologies to enhance understanding of fast-paced, uncertain hazardous materials (HAZMAT) response situations. Before developing improved technologies, we need to understand HAZMAT operations in practice as opposed to how it is presented in the manuals. To gain this understanding, we have been interviewing HAZMAT personnel and observing exercises. This paper presents an analysis of the communications that occurred among personnel, primarily in person or via radio, during three HAZMAT exercises (focusing on one day-long exercise in particular). This analysis allowed us to pinpoint problem areas that could potentially be addressed by decision support technologies. We provide our assessment of technology approaches that could aid the more serious problems we saw in our analysis.","PeriodicalId":366416,"journal":{"name":"2008 IEEE Conference on Technologies for Homeland Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-05-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114515680","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信